2025-03-16 03:03:50 +00:00

33 lines
2.1 KiB
JSON

{
"id": "CVE-2025-21842",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-03-07T09:15:17.237",
"lastModified": "2025-03-07T09:15:17.237",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\namdkfd: properly free gang_ctx_bo when failed to init user queue\n\nThe destructor of a gtt bo is declared as\nvoid amdgpu_amdkfd_free_gtt_mem(struct amdgpu_device *adev, void **mem_obj);\nWhich takes void** as the second parameter.\n\nGCC allows passing void* to the function because void* can be implicitly\ncasted to any other types, so it can pass compiling.\n\nHowever, passing this void* parameter into the function's\nexecution process(which expects void** and dereferencing void**)\nwill result in errors."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: amdkfd: libera correctamente gang_ctx_bo cuando no se puede inicializar la cola de usuarios El destructor de un bo gtt se declara como void amdgpu_amdkfd_free_gtt_mem(struct amdgpu_device *adev, void **mem_obj); que toma void** como segundo par\u00e1metro. GCC permite pasar void* a la funci\u00f3n porque void* se puede convertir impl\u00edcitamente a cualquier otro tipo, por lo que puede pasar la compilaci\u00f3n. Sin embargo, pasar este par\u00e1metro void* al proceso de ejecuci\u00f3n de la funci\u00f3n (que espera void** y desreferenciar void**) dar\u00e1 como resultado errores."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/091a68c58c1bbd2ab7d05d1b32c1306394ec691d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a33f7f9660705fb2ecf3467b2c48965564f392ce",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ae5ab1c1ae504f622cc1ff48830a9ed48428146d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}